Symantec researchers have discovered a piece of malware that leverages Google Docs to communicate with its command-and-control (C&C) server.
The malware is a version of the Makadocs Trojan, which opens a backdoor on the compromised computer and tries to steal information. The latest version of the malware uses Google Docs are a proxy server to reach its C&C.
“Google docs has a function called viewer that retrieves the resources of another URL and displays it,” blogged Takashi Katsuki of Symantec. “Basically, this functionality allows a user to view a variety of file types in the browser. In violation of Google’s policies, Backdoor.Makadocs uses this function to access its C&C server.”
“It is possible that the malware author has implemented this functionality in an attempt to prevent the direct connection to the C&C from being discovered,” the researcher continued. “The connection to the Google docs server is encrypted using HTTPS, thereby making it difficult to be blocked locally. It is possible for Google to prevent this connection by using a firewall.”
This is far from the first time hackers have used non-traditional methods of communicating with their command and control infrastructure. Other pieces of malware have used Twitter and Facebook to receive instructions.
According to Symantec, Makadocs hits users as a rich text format (RTF) file or Microsoft Word document. The malicious file does not use any vulnerability in order to drop its component; instead it relies on social engineering, Katsuki wrote. He explained that its attempts to lure the user into executing it with the title and content of the document, and that clues in the code lead him to believe the malware is primarily targeting people living in Brazil.
The malware includes code to detect the operating system being used by the victim, including Windows 8 and Windows Server 2012.
“This is not necessarily a surprise for security researchers as we always encounter new malware when new products are released,” Katsuki wrote. “However, this malware does not use any particular function unique to Windows 8 and we know that this malware existed before the launch of Windows 8. Based on these facts, we believe this code must be an update to the malware.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
